OEI: Operation Execution Integrity for Embedded Devices
نویسندگان
چکیده
We formulate a new security property, called “Operation Execution Integrity” or OEI, tailored for embedded devices. Inspired by the operation-oriented design of embedded programs and considering the limited hardware capabilities of embedded devices, OEI attestation enables selective and practical verification of both control-flow integrity and critical-variable integrity for an operation being executed. This attestation allows remote verifiers to detect control-flow hijacks as well as data-only attacks, including data-oriented programming, on an embedded device—a capability needed for securing IoT but unachievable using existing methods. We design and build a system, called OAT, to realize and evaluate the idea of OEI attestation on ARM-based baremetal devices. OAT features a highly efficient measurement collection mechanism, a control-flow measurement scheme designed for determinate verifiability, and a method for lightweight variable-integrity checking. When tested against real-world embedded programs on a development board, OAT incurred only a mild runtime overhead (2.7%).
منابع مشابه
Sponge-Based Control-Flow Protection for IoT Devices
Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges. For example, software attackers perform code injection and code-reuse attacks on their remote interfaces, and physical access to IoT devices allows to tamper with code in memory, steal confidential Intellectual Property (IP), or mount fault attacks to manipulate a CPU’s control flow. In this work, we pr...
متن کاملMaintaining Terminal Integrity and Context-Aware Reconfiguration
There is a need for terminal management mechanisms for high volume embedded devices. Current technology provides mechanisms for adaptation of software on embedded devices during their deployment. These mechanisms give the opportunity to adapt a device to the wishes of the consumer at a specific location or time. While being useful to the user, these mechanisms might also jeopardize the software...
متن کاملFormal Mirror Models: an Approach to Just-in-Time Reasoning for Device Ecologies
Pervasive computing calls for new ways of thinking about software and new ways of applying software development techniques. In pervasive computing environments, users will need to interact with collections of devices surrounding them (such as the “system” of smart devices in a user’s home), which we metaphorically term device ecologies. A user can interact with these devices with embedded softw...
متن کاملMirror Models for Pervasive Computing: Just-in-Time Reasoning about Device Ecologies
In pervasive computing environments, users will need to interact with collections of devices surrounding them (such as the “system” of smart devices in a user’s home), which we metaphorically term device ecologies. A user can interact with these devices with embedded software and hardware, either directly via the device’s own interface, or automated through scripts executed by a central coordin...
متن کاملRead It Twice! A Mass-Storage-Based TOCTTOU Attack
Consumer electronics and embedded devices often allow the installation of applications and firmware upgrades from user-provided mass-storage devices. To protect the integrity of these devices and the associated electronic markets, the software packages are protected by cryptographic signatures. The software installation code assumes that files on attached mass-storage devices cannot change whil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1802.03462 شماره
صفحات -
تاریخ انتشار 2018